Password Authentication Based on Fractal Coding Scheme

Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

[1]  Joan Puate,et al.  Using fractal compression scheme to embed a digital signature into an image , 1997, Other Conferences.

[2]  Tung-Shou Chen,et al.  Detecting and restoring the tampered images based on iteration-free fractal compression , 2003, J. Syst. Softw..

[3]  Yung-Gi Wu,et al.  Fractal image compression with variance and mean , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[4]  Michael F. Barnsley,et al.  Fractals everywhere , 1988 .

[5]  Yuval Fisher Fractal Image Compression , 1994 .

[6]  Min-Shiang Hwang,et al.  A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[7]  B. Jayaram,et al.  Retinal Biometrics based Authentication and Key Exchange System , 2011 .

[8]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[9]  Carlo Blundo,et al.  The Key Establishment Problem , 2001, FOSAD.

[10]  Eun-Jun Yoon,et al.  A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices , 2007, APWeb/WAIM Workshops.

[11]  Manoj Kumar A New Secure Remote User Authentication Scheme with Smart Cards , 2010, Int. J. Netw. Secur..

[12]  Cheng‐Hao Li,et al.  Digital watermarking based on fractal image coding , 2000 .

[13]  Jason Bock,et al.  NET security , 2002 .

[14]  M. Barnsley,et al.  Iterated function systems and the global construction of fractals , 1985, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[15]  Roman Jasek,et al.  Advanced user authentication process based on the principles of fractal geometry , 2011 .

[16]  J. K. Lee,et al.  Fingerprint-based remote user authentication scheme using smart cards , 2002 .

[17]  Younghwa An,et al.  Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards , 2012, Journal of biomedicine & biotechnology.

[18]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[19]  Hung-Yu Chien,et al.  An Efficient and Practical Solution to Remote Authentication: Smart Card , 2002, Comput. Secur..

[20]  Nadia M. G. Al-Saidi,et al.  Improved digital signature protocol using iterated function systems , 2011, Int. J. Comput. Math..

[21]  Nevenko Zunic,et al.  Methods for Protecting Password Transmission , 2000, Comput. Secur..

[22]  Nadia M. G. Al-Saidi,et al.  A New Approach in Cryptographic Systems Using Fractal Image Coding , 2009 .

[23]  A. Jacquin A fractal theory of iterated Markov operators with applications to digital image coding , 1989 .